NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.

Chapter 4. Workstation Security

Securing a Linux environment begins with the workstation.
Whether locking down a personal machine or securing an enterprise
system, sound security policy begins with the individual computer.
After all, a computer network is only as secure as its weakest
node.